Swipe through the first post to learn how to extract endpoints from mobile apps to test for BAC flaws!
#BugBounty #HackWithIntigriti #BugQuest
Latest posts tagged with #Bugbounty on Bluesky
Swipe through the first post to learn how to extract endpoints from mobile apps to test for BAC flaws!
#BugBounty #HackWithIntigriti #BugQuest
#Google paid $17.1 million for vulnerability reports in 2025
www.bleepingcomputer.com/news/google/google-paid-...
#cybersecurity #BugBounty
Even when introspection is disabled, GraphQL's auto-complete error messages will suggest correct field names when you send typos.
Swipe through to learn how to extract complete API schemas from GraphQL endpoints!
#BugBounty #HackWithIntigriti #BugQuest
~Akamai~
AI-generated false positives are overwhelming bug bounty programs and CVE databases, requiring strict human oversight.
-
IOCs: (None identified)
-
#AI #BugBounty #ThreatIntel
📰 Google Bayar $17,1 Juta untuk Laporan Kerentanan Keamanan Sepanjang 2025
👉 Baca artikel lengkap di sini: ahmandonk.com/2026/03/14/bug-bounty-go...
#bugBounty #cyberSecurity #google #keamananSiber #vulnerability
Google Paid $17.1M For Bugs In 2025
Read More: buff.ly/sGUNuDf
#BugBounty #GoogleVRP #VulnerabilityResearch #SecurityResearchers #ResponsibleDisclosure #CyberInnovation #AppSec #Infosec
These external sources can reveal endpoints that haven't been referenced before in your target, but do exist and work in production.
Swipe through to learn where to search and what to look for!
#BugBounty #HackWithIntigriti #BugQuest
Google achieved a record-breaking $17.1 million in bug bounty payouts through its Vulnerability Reward Program in 2025
#Google #BugBounty
funny how “internal only” endpoints always seem to show up on the internet. #bugbounty
Great evening at the Microsoft Security User Group Norway × Security Champions Norway meetup yesterday! 🌃
🔗 www.linkedin.com/posts/roberi...
#Security #CyberSecurity #EntraID #OIDC #BugBounty #MicrosoftSecurity #Community #Meetup #MSUGN #SigmaTechnology #WeMakeTechnologyUsable #Norway
Autonomous AI agents are revolutionizing cybersecurity research. Our swarm hunts vulnerabilities 24/7 across DeFi protocols. Learn more at https://api.wingmanprotocol.com #DeFiSecurity #AI #BugBounty
When you suspect undocumented endpoints to be present, it's always recommended to further enumerate your target for more endpoints & routes.
Swipe through today's post to learn where to find (& learn to utilize) API docs!
#BugBounty #HackWithIntigriti #BugQuest
Originally from ProjectDiscovery: Inside the Benchmark: App Architectures, Walkthroughs of Findings, and What Each Scanner Actually Caught ( :-{ı▓ #projectdiscovey #bugbounty #cyberresearch
Follow the redirect chain.
Run curl -v or Burp to watch every hop. Misconfigured 301/302 responses can expose hidden endpoints or open redirect opportunities. #BugBounty
Looking to make some extra cash using your #BugBounty / #ThreatHunting skills? Report security issues and #zerodays through through our website today and maybe make some money- https://linktr.ee/dprkcert
#BTC #0day
Tools like LinkFinder and JSParser automate this process, but understanding what to look for can help you spot patterns that automated tools might miss.
Swipe through to see how JS files can include endpoints and how to extract them!
#BugBounty #HackWithIntigriti #BugQuest
Found Reflected XSS on a bug bounty target 🎯
Payload:
<img src=x onerror=prompt(/XSS/)>
Reported responsibly ✅
#BugBounty #XSS #InfoSec
Swipe through to learn how to fuzz effectively and build wordlists that actually work!
#BugBounty #HackWithIntigriti #BugQuest
Looking to make some extra cash using your #BugBounty / #ThreatHunting skills? Report security issues and #zerodays through through our website today and maybe make some money- https://linktr.ee/dprkcert
#BTC #0day
SSRF isn't just a web vulnerability. If the target is on AWS, you can check the metadata endpoint - 169.254.169.254. Pulling IAM keys from /latest/meta-data/iam/security-credentials/ turns a simple web bug into a full-blown cloud leak. 🌩️ #BugBounty #AWS #CloudSecurity
Bug bounties are broken, and the best security pros are moving on
📖 Read more: www.helpnetsecurity.com/2026/03/10/c...
#cybersecurity #cybersecuritynews #bugbounty #PTaaS #penetrationtesting
bug hunting teaches you patience… or caffeine dependency. usually both. #bugbounty
Swipe through to see a few examples of config files to check and what they can reveal!
#BugBounty #HackWithIntigriti #BugQuest
From common paths and API docs to JavaScript files and mobile apps, there are multiple ways to uncover hidden endpoints that may lack proper authorization checks.
Swipe through to see the main discovery techniques! 👇
#BugBounty #HackWithIntigriti #BugQuest
How to become a bug bounty hunter
negativepid.blog/how...
#bugBounty #bugHunter #careers #tech #Cybersecurity #cyberattacks #cyberThreats #onlineSecurity #negativepid
New cheatsheets pushed
github.com/r1cksec/chea...
#infosec #cybersecurity #redteam #pentest #threatintel #malware #dfir #bugbounty #opensource
We'll show you how to find hidden endpoints, enumerate APIs, and uncover the resources you need to test for BAC bugs. This is also where the real fun begins! 💪
#BugBounty #HackWithIntigriti #BugQuest
sometimes the PoC is just a screenshot of “oops, unauthorized.” #bugbounty
phew, good on the hacker for finding this before the bad guys did. another close call. bug bounties are so important for this. #bugbounty